Security February 1, 2023 The Rise of the Code Package Threat Highlights: Check Point details two recent attacks detected and blocked by our Threat Prevention engines, ...
Securing the Cloud February 13, 2019 Docker Security Hole Revealed: Mitigate CVE-2019-5736 by Marina Segal – Lead Product Manager, CloudGuard Dome9, Check Point and Amir Kaushansky – Product ...
Security August 16, 2018 Who You Gonna Call? Stories From the Front Line of Cyber Defense By Check Point’s Incident Response Team In our industry, we tell our stories with ...
Research June 7, 2018 May’s Most Wanted Malware: Cryptomining Malware Digs into Nearly 40% of Organizations Globally Check Point’s latest Global Threat Index reveals that the Coinhive cryptominer impacted 22% of organizations, ...
Research May 14, 2018 April’s Most Wanted Malware: Cryptomining Malware Targeting Unpatched Server Vulnerabilities After analysing April’s threat data from a global network of sensors and millions of data ...
Security February 1, 2018 How Can Your Business Score Touchdowns Without An Offensive Line? What the Philadelphia Eagles Can Teach Us About Cyber-Security Imagine your founding CTO resigning ...
Harmony January 5, 2018 LightsOut: Shining a Light On Malicious Flashlight Apps on Google Play Check Point researchers have detected a new type of adware roaming Google Play, the official ...
Innovation November 13, 2017 October’s Most Wanted Malware: Cryptocurrency Mining Presents New Threat Check Point’s latest Global Threat Index has revealed crypto miners were an increasingly prevalent form ...
Research October 31, 2017 Account Hijacks Affect Everybody, Even ‘Top Dogs’ Being “cool and smart” was the name of the game when we were at school, ...
Security October 26, 2017 HomeHack: How Hackers Could Have Taken Control of LG’s IoT Home Appliances The second season of award-winning TV thriller Mr. Robot premiered with a scene that sent ...